Reference Hub1
AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection

AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection

P. Natesan, P. Balasubramanie, G. Gowrison
Copyright: © 2016 |Pages: 11
ISBN13: 9781466687615|ISBN10: 1466687614|EISBN13: 9781466687622
DOI: 10.4018/978-1-4666-8761-5.ch011
Cite Chapter Cite Chapter

MLA

Natesan, P., et al. "AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection." Network Security Attacks and Countermeasures, edited by Dileep Kumar G., et al., IGI Global, 2016, pp. 259-269. https://doi.org/10.4018/978-1-4666-8761-5.ch011

APA

Natesan, P., Balasubramanie, P., & Gowrison, G. (2016). AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection. In D. G., M. Singh, & M. Jayanthi (Eds.), Network Security Attacks and Countermeasures (pp. 259-269). IGI Global. https://doi.org/10.4018/978-1-4666-8761-5.ch011

Chicago

Natesan, P., P. Balasubramanie, and G. Gowrison. "AdaBoost Algorithm with Single Weak Classifier in Network Intrusion Detection." In Network Security Attacks and Countermeasures, edited by Dileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, 259-269. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-4666-8761-5.ch011

Export Reference

Mendeley
Favorite

Abstract

Recently machine learning based intrusion detection system developments have been subjected to extensive researches because they can detect both misuse detection and anomaly detection. In this paper, we propose an AdaBoost based algorithm for network intrusion detection system with single weak classifier. In this algorithm, the classifiers such as Bayes Net, Naïve Bayes and Decision tree are used as weak classifiers. KDDCup99 dataset is used in these experiments to demonstrate that boosting algorithm can greatly improve the classification accuracy of weak classification algorithms. Our approach achieves higher detection rate with low false alarm rates and is scalable for large datasets, resulting in an effective intrusion detection system.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.